Pages that link to "Item:Q3604475"
From MaRDI portal
The following pages link to A General Construction of Tweakable Block Ciphers and Different Modes of Operations (Q3604475):
Displaying 16 items.
- On modes of operations of a block cipher for authentication and authenticated encryption (Q301626) (← links)
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code (Q1698650) (← links)
- A method of constructing symmetric-key block cryptosystem resistant to manipulations on ciphertext (Q1767285) (← links)
- Tweakable enciphering schemes using only the encryption function of a block cipher (Q1944173) (← links)
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector (Q2016427) (← links)
- Tight security of cascaded LRW2 (Q2188969) (← links)
- Tweaking key-alternating Feistel block ciphers (Q2229265) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework (Q2936613) (← links)
- The Software Performance of Authenticated-Encryption Modes (Q3013091) (← links)
- NIST Block Cipher Modes of Operation for Confidentiality (Q3583512) (← links)
- Building Secure Block Ciphers on Generic Attacks Assumptions (Q3644193) (← links)
- Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher (Q5281359) (← links)
- \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher (Q6157576) (← links)
- Farasha: a provable permutation-based parallelizable PRF (Q6619859) (← links)
- Tight security of \textsf{TNT} and beyond. Attacks, proofs and possibilities for the cascaded \textsf{LRW} paradigm (Q6636391) (← links)